2 .\" Copyright (c) 2003 Tom Rhodes
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 .Nd "System Management Application Program Interface driver"
35 laptops utilize a special software interface known as
37 (System Management Application Program Interface).
38 This interface controls various aspects of the system including:
44 can store system information such as the system identifier),
46 System Configuration (where devices such as the display can be configured),
48 Power Management (software can interact with the
50 for Power Management control).
53 Client software must locate a
59 (read-only memory), which resides at the 16-byte boundary.
60 This is considered the
66 stores information like:
72 version (major and minor),
76 checksum information (which verifies the image),
78 an Information Word (used to identify the
82 Real Mode Entry Point (where clients using the
83 Real/V86 mode for the far-call value),
85 and finally a 16-bit/32-bit Protected Mode Entry
86 Point: base code address which specifies the
89 The client must prepare a 64 kilobyte selector for this
95 a far-call must be used on the entry point specified in the header file.
96 All other information should be stored in the client data area.
97 The client is required to prepare both an input and output parameter in a
101 by pushing those pointers into its stack before the far-calls.
105 uses the stack and data areas with the selector during a
107 invocation, thus the caller must define the same privilege area as the
110 The parameter structure will be made up by using the input and output
111 fields prepared by the caller.
112 The input field will specify the function request to the
116 will then drop a return value into the output field.
117 These fields are made up of three parts.
118 The first holds parameters, function numbers, and return codes.
119 The next will contain an offset in hexadecimal.
120 Finally a length field which is comprised of Byte, Word, or Double Word.
123 .%B "IBM Thinkpad 560/560E Technical Reference"
124 .%O "06J0536 S76H-7587-01"
127 .%B "IBM Thinkpad 560Z Technical Reference"
128 .%O "xxxxxxx xxxx-xxxx-xx"
131 .%B "IBM Thinkpad 600 Technical Reference"
132 .%O "xxxxxxx xxxx-xxxx-xx"
135 .%B "IBM Thinkpad 760XD/760XL/765D/765L Technical Reference"
136 .%O "06J0537 S30H-2433-02"
139 .%B "IBM Thinkpad 770 Technical Reference"
140 .%O "05L1739 S05L-1739-00"
146 driver was written by
147 .An Matthew N. Dodd Aq Mt mdodd@FreeBSD.org .
148 This manual page was written by
149 .An Tom Rhodes Aq Mt trhodes@FreeBSD.org
151 .An Matthew N. Dodd Aq Mt mdodd@FreeBSD.org .